• Aucun résultat trouvé

Haut PDF Bandwidth reservation in mobile ad hoc networks for providing QoS : adaptation for voice support

Bandwidth reservation in mobile ad hoc networks for providing QoS : adaptation for voice support

Bandwidth reservation in mobile ad hoc networks for providing QoS : adaptation for voice support

... Abstract QoS provisioning over Mobile Ad-Hoc Networks (MANETs) has attracted a great attention in recent ...provide QoS over wired and cellular networks, QoS ...

191

Bandwidth reservation in mobile adhoc networks

Bandwidth reservation in mobile adhoc networks

... flows in the network. In order to evaluate AB in wireless ad hoc networks, some authors [1] adopt methods which are intended firstly for wired networks [2], where ...

7

Available Bandwidth Estimation for IEEE 802.11-based Ad Hoc networks

Available Bandwidth Estimation for IEEE 802.11-based Ad Hoc networks

... Introduction Ad hoc networks are autonomous, self-organized wireless and mobile ...works in ad hoc networking assume that the under- lying wireless technology is the IEEE ...

35

QoS-aware Routing for Real-Time and Multimedia Applications in Mobile Ad Hoc Networks

QoS-aware Routing for Real-Time and Multimedia Applications in Mobile Ad Hoc Networks

... provide bandwidth and delay guarantees. Most of QoS ad hoc network routing protocols select path guaranteeing delay and/or ...results in a low number of admitted real-time and ...

8

QoS Preserving Topology Advertising Reduction for OLSR Routing Protocol for Mobile Ad Hoc Networks

QoS Preserving Topology Advertising Reduction for OLSR Routing Protocol for Mobile Ad Hoc Networks

... guaranteed QoS is demanded, an option is to modify existing protocols to use only the links respecting QoS ...method for QoS paths selection, based on network topology complexity ...are ...

15

A Distributed Algorithm for Bandwidth Allocation in Stable Ad Hoc Networks

A Distributed Algorithm for Bandwidth Allocation in Stable Ad Hoc Networks

... such networks, mechanisms like bandwidth reservation are essentially provided for constrained traffic, for example real-time ...traffics’ bandwidth share, making the guarantees ...

25

A Managed Bandwidth Reservation Protocol for Ad Hoc Networks

A Managed Bandwidth Reservation Protocol for Ad Hoc Networks

... consists in the flooding of a route request with QoS ...a mobile receives such a request, it performs an admission control based on the large knowledge previously ...the mobile reserves the ...

14

P2P SIP over mobile ad hoc networks

P2P SIP over mobile ad hoc networks

... mobility support on SIPMON+ Seamless mobility support is one of the main requirements when connecting a mobile ad hoc network (MANET) to a fixed infrastructure network allowing a ...

161

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

... sender. In contrast in content-based communication the sender does not nec- essarily know who the recipients of its message are, or even if they exist at ...used in stable, wired networks, or ...

33

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks

... communication in disconnected, partially connected, or intermittently connected mobile ad hoc net- ...ing in ”delay-tolerant networks” [6, 9], while others rather consider the ...

5

Quality-delay tradeoff for video streaming over mobile ad hoc networks

Quality-delay tradeoff for video streaming over mobile ad hoc networks

... CONCLUSIONS In this paper, we study the impact of mobility on video streaming over wireless ad hoc networks from the perspec- tives of video quality and transmission ...delay. In ...

6

WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks

WATCHMAN : an overlay distributed AAA architecture for mobile ad hoc networks

... addressed in section ...management in this ...node in this chain is compromised, the chain will break and the next authenticated nodes may not be considered as trustworthy ...asks for ...

9

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

... fit in the general category of gossip- based ...profiles. In the A/G algorithm, information dissemination is perceived as an epidemic process: each host is considered as being more or less vulnerable to ...

9

CONNECTION TIMES IN LARGE AD-HOC MOBILE NETWORKS

CONNECTION TIMES IN LARGE AD-HOC MOBILE NETWORKS

... phrases. ad-hoc networks, connectivity, random waypoint model, dynamic continuum percolation, large deviations ...goals. Ad-hoc networks consist of individuals in a given ...

28

SLSF: Stable Linked Structure Flooding For Mobile Ad Hoc Networks

SLSF: Stable Linked Structure Flooding For Mobile Ad Hoc Networks

... NLWCA organizes ad hoc networks in one-hop clusters (Figure 1) by using only information available locally. Each device elects exactly one device as its clusterhead, i.e. the neighbor with the ...

7

Service Provision in Disconnected Mobile Ad Hoc Networks

Service Provision in Disconnected Mobile Ad Hoc Networks

... issues in ad hoc networks. DEAPspace provides a support for the discovery and the delivery of services in wireless single-hop ad hoc ...wireless ad ...

7

Attack notification and adaptation in ad hoc networks

Attack notification and adaptation in ad hoc networks

... The identifying node takes the attack packet and rebroadcasts it to all other nodes in the network using the out-of-band communication mechanism.. Dissemination in th[r] ...

51

Routing in Large Scale tactical mobile ad hoc Networks

Routing in Large Scale tactical mobile ad hoc Networks

... exist in the network such as clustering or unicast ...service in a node architecture but is integrated in a network architecture where multiple services are ...piggyback in these messages the ...

204

Adaptation Process for Ad hoc Routing Protocol

Adaptation Process for Ad hoc Routing Protocol

... by broadcasting an ABORT packet in the network (for example, few registered Cluster Heads indicating a low global density) and pass into DSR mode. After its election, each Cluster Head registers to the ...

11

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

... larger for the ...nodes. In the model, we supposed that these delays were negligible. However in the simulations, we realized, after processing NS-2 log files, that these delays represent about 30% ...

6

Show all 10000 documents...